【24h】

Flow-Limited Authorization

机译:限流授权

获取原文

摘要

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence how authority is delegated between principals. We argue that interactions between information flow and authorization create security vulnerabilities that have not been fully identified or addressed in prior work. We explore how the security of decentralized information flow control (DIFC) is affected by three aspects of its underlying authorization mechanism: first, delegation of authority between principals, second, revocation of previously delegated authority, third, information flows created by the authorization mechanisms themselves. It is no surprise that revocation poses challenges, but we show that even delegation is problematic because it enables unauthorized downgrading. Our solution is a new security model, the Flow-Limited Authorization Model (FLAM), which offers a new, integrated approach to authorization and information flow control. FLAM ensures robust authorization, a novel security condition for authorization queries that ensures attackers cannot influence authorization decisions or learn confidential trust relationships. We discuss our prototype implementation and its algorithm for proof search.
机译:由于信息流控制机制通常依赖于底层的授权机制,因此其安全性保证可能会被授权中的弱点所破坏。相反,可以通过泄漏信息或影响委托人之间的授权方式的信息流来破坏授权的安全性。我们认为,信息流与授权之间的交互会创建安全漏洞,而在先前的工作中尚未完全识别或解决这些安全漏洞。我们探索分散式信息流控制(DIFC)的安全如何受到其基础授权机制的三个方面的影响:第一,主体之间的授权,第二,撤销先前委托的权限,第三,授权机制本身创建的信息流。撤销带来了挑战也就不足为奇了,但是我们证明,即使授权也存在问题,因为它允许未经授权的降级。我们的解决方案是一种新的安全模型,即流受限授权模型(FLAM),它提供了一种新的集成方法来进行授权和信息流控制。 FLAM确保强大的授权,这是用于授权查询的新颖安全性条件,可确保攻击者无法影响授权决策或了解机密信任关系。我们讨论了原型实现及其用于证明搜索的算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号